This is the second time I've read about an iPhone OCR rack https://findthatmeme.com/blog/2023/01/08/image-stacks-and-ip...
Is this still state of the art in terms of local OCR?
It would have cost $375,000 to use cloud OCR for this project. Mandatory is absolutely a baller, but not crazy enough to spend that kind of money on the project.
If you can get Tesseract to generate comparable results with sub-optimal images from eBay listings, I'd love to know more.
I have then employed a multimodal LLM and had a 100% success rate.
Considering what apps like Notes can do low key on iOS… I wouldn’t be surprised if there would exist more capability.
Iirc, Apple was holding back improvements to Siri and other techs.
ARM Apple Silicon Developer Transition Kit: https://www.youtube.com/watch?v=reQq8fx4D0Q iPod Touch dev board: https://www.youtube.com/watch?v=qLCt6oHPTQM
The PCB repair technique for the DTK is pretty cool on its own.
They can essentially guarantee that the disk encryption key will only be released from the security module if the computer is running a fully-trusted and signed OS. Even if you take the drive out of the machine, the data on that drive is completely useless to you.
Incidentally, this is also what makes short PINs secure; the TPM contents are unreadable, even to a skilled attacker, so if the TPM is guaranteeed to wipe itself after 10 tries, even a 4-digit PIN is secure enough.
Depends how "skilled". Nation-state level? Most definitely not. "IC break" services in China? Maybe. AFAIK TPMs are based on similar secure-processor designs as the chips in payment cards and other smartcards, and even those with enough determination and $$$, or the right equipment, will get you through.
Here's an old but quite thorough discussion of the techniques involved: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.pdf
> Bryant again reported his findings to Apple and returned the Mac Mini to them.
Why the hell did he do that?! It's, like, the worst thing one can possibly do with these kinds of devices. Just publish stuff that doesn't have anyone's personal data in it. That'll make the world better in the end.
We all know companies are predatory, and in many cases companies (looking right at you Google and Microsoft) continue to refuse to pay people for discovering, documenting and reporting high-severity vulnerabilities. That doesn't mean we as individuals forfeit our principles and become just as corrupt as the "faceless corporate entities."
citation needed.
Or, at least, catalogued, scanned, and photographed.
I've seen everything from Amazon's palm-scanners to a tactical LTE base station once used by NIST to all sorts of Zebras full of fun software.
I think the only piece I'd pay to read is how they negotiated with spotify.